This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
LG App Monitoring Security Solution V1.0 for webOS TV KECS-CISS-1174-2022 |
Microcontrôleur ORION_CB_03 ANSSI-CC-2017/41 |
|
---|---|---|
name | LG App Monitoring Security Solution V1.0 for webOS TV | Microcontrôleur ORION_CB_03 |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | KR | FR |
not_valid_after | 23.06.2027 | 07.06.2027 |
not_valid_before | 23.06.2022 | 26.07.2017 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017_41-s05.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[KECS-CR-22-32]%20LG%20App%20Monitoring%20Security%20Solution%20V1.0%20for%20webOS%20TV%20Certification%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_41fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LG%20App%20Monitoring%20Security%20Solution%20V1.0%20for%20webOS%20TV%20Security%20Target%20V1.7.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_41-cible.pdf |
manufacturer | LG ELECTRONICS Co., Ltd. | INVIA Secure Semiconductor |
manufacturer_web | https://www.lg.com | https://www.invia.fr |
security_level | EAL2 | EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst | 0803efbdde62d12c | 34afdb93cf8d78bd |
heuristics/cert_id | KECS-CISS-1174-2022 | ANSSI-CC-2017/41 |
heuristics/cert_lab | [] | CEA |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 1.0 | - |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2022/51 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2022/51 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by | {} | ANSSI-CC-2022/51 |
heuristics/st_references/indirectly_referenced_by | {} | ANSSI-CC-2022/51 |
heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | certificat-anssi-cc-2017_41-s05.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | [KECS-CR-22-32] LG App Monitoring Security Solution V1.0 for webOS TV Certification Report.pdf | anssi-cc-2017_41fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | LG App Monitoring Security Solution V1.0 for webOS TV Security Target V1.7.pdf | anssi-cc-2017_41-cible.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |